Volume 8, Issue 34, December 2015

Table of Contents

Articles

Audio Steganography using QR Decomposition and Fast Fourier Transform  | 
Ifra Bilal, Rajiv Kumar
DOI: 10.17485/ijst/2015/v8i34/69604 | Total views: 604
Production Planning Using Fuzzy Meta–Goal Programming Model  | 
A.K. Bhargava, S.R. Singh, Divya Bansal
DOI: 10.17485/ijst/2015/v8i34/70706 | Total views: 285
A Novel Approach for Serial Crime Detection with the Consideration of Class Imbalance Problem  | 
S. Sivaranjani, S. Sivakumari
DOI: 10.17485/ijst/2015/v8i34/71333 | Total views: 380
Prediction of Job Stress among Employees through the Dimensions of Time Management Skills by Managers  | 
Bita Ajilchi, Flor Rezaei Kargar
DOI: 10.17485/ijst/2015/v8i34/73334 | Total views: 759
MAC Protocols for Wireless Sensor Networks  | 
R. Ramya, G. Saravanakumar, S. Ravi
DOI: 10.17485/ijst/2015/v8i34/72318 | Total views: 542
Multil-Kernels Integration for FCM Algorithm for Medical Image Segmentation using Histogram Analasis  | 
Nookala Venu, B. Anuradha
DOI: 10.17485/ijst/2015/v8i34/72409 | Total views: 505
An Intelligent Boxing Application through Augmented Reality for two users – Human Computer Interaction attempt  | 
Shriram K Vasudevan, Vivek C, Srivathsan S
DOI: 10.17485/ijst/2015/v8i34/73731 | Total views: 441
Switch Pattern Encryption Based WBAN Security in an IoT Environment  | 
M. Ramakrishnan
DOI: 10.17485/ijst/2015/v8i34/85274 | Total views: 387
The Property of Learning effect based on Delayed Software S-Shaped Reliability Model using Finite NHPP Software Cost Model  | 
Hee-Cheul Kim
DOI: 10.17485/ijst/2015/v8i34/85290 | Total views: 296
An Intelligent Attempt to Export Files into Cloud in Handheld Devices through Gesture Recognition  | 
Shriram K. Vasudevan, C. Vivek
DOI: 10.17485/ijst/2015/v8i34/71902 | Total views: 307
Numerical Modeling of Sharp-Crested Triangular Plan Form Weirs Using FLUENT  | 
Mahmoud Reza Shaghaghian, Mohammad Taghi Sharifi
DOI: 10.17485/ijst/2015/v8i34/78200 | Total views: 562
Feature Extraction from Immunohistochemistry Images to Classify ER/PR Scores  | 
P. Smitha, Varghese Paul, L. Shajy, K. Sujathan
DOI: 10.17485/ijst/2015/v8i34/79369 | Total views: 499
Efficient Lossless Image Compression using Modified Hierarchical Forecast and Context Adaptive System  | 
P. Suresh Babu, S. Sathappan
DOI: 10.17485/ijst/2015/v8i34/74365 | Total views: 393
Correlation Study on Defect Density with Domain Expert Pair Speed for Effective Pair Programming  | 
K. S. Sunitha, K. Nirmala
DOI: 10.17485/ijst/2015/v8i34/72194 | Total views: 262
Latent Relation Analysis based Discovering Fraudulent Ranking Identification on Mobile Web Apps  | 
L. VelMurugan
DOI: 10.17485/ijst/2015/v8i34/74505 | Total views: 281
An Exploratory Study of Telecommunication Sector for Selected Countries  | 
Abhishek Behl
DOI: 10.17485/ijst/2015/v8i34/85417 | Total views: 296
Dynamical Control of Accuracy using the Stochastic Arithmetic to Estimate the Solution of the Fuzzy Differential Equations via Homotopy Analysis Method  | 
Amir Fallahzadeh, Mohammad Ali Fariborzi Araghi
DOI: 10.17485/ijst/2015/v8i34/50621 | Total views: 250
In-Vivo Toxicity Assessment of Aspartame in Drosophila melanogaster and Danio rerio  | 
Fahira Reshman, R. Sumitha, V . Deepa Parvathi
DOI: 10.17485/ijst/2015/v8i34/70677 | Total views: 461
Spectrum Sensing for Cognitive Radio using Hilbert- Huang Transform Average Ratio Detector  | 
Sree Vardhan Cheerla, D. Venkata Ratnam, Allada Sai Nitin, T. Durga Sai Sruthi
DOI: 10.17485/ijst/2015/v8i34/70785 | Total views: 350
Implementation of Distributed Power Control /Active Link Protection for Femto Cell Networks  | 
Sreevardhan Cheerla, D. Venkata Ratnam, M. Siva Ganga Prasad, B. Vyshanvi, A. Sai Nitin
DOI: 10.17485/ijst/2015/v8i34/70783 | Total views: 340
Sensory Evaluation of Misti Dahi Prepared from Blending of Soymilk with Buffalo Milk  | 
Kunwar Vikash Singh, S. P. Singh, Anoop Singh Chauhan, Shilpi Singh
DOI: 10.17485/ijst/2015/v8i34/61138 | Total views: 315
A Semantic Deduplication of Temporal Dynamic Records from Multiple Web Databases  | 
R. Parimala Devi, V. Thigarasu
DOI: 10.17485/ijst/2015/v8i34/75103 | Total views: 369
Multi Script Text Transliteration to Punjabi  | 
Kamaljeet Kaur, Parminder Singh
DOI: 10.17485/ijst/2015/v8i34/85944 | Total views: 322
Application of Qualitative Comparative Analysis: Competition Environment in Five Countries  | 
Giri Hallur
DOI: 10.17485/ijst/2015/v8i34/85419 | Total views: 356
Small Signal Stability Enhancement using STATCOM based on Eigen Value Analysis  | 
K. Karthikeyan, P. K. Dhal
DOI: 10.17485/ijst/2015/v8i34/86119 | Total views: 423
Weighted Page Rank Algorithm based on In-Out Weight of Webpages  | 
B. Jaganathan, Kalyani Desikan
DOI: 10.17485/ijst/2015/v8i34/86120 | Total views: 388
An Integrated Approach for Intrusion Detection using Computational Methods  | 
B. Ben Sujitha, V. Kavitha
DOI: 10.17485/ijst/2015/v8i34/86123 | Total views: 337
Smart Funding Options for Developing Smart Cities: A Proposal for India  | 
Chintan Vadgama Vadgama, Aditi Khutwad, Madhavi Damle, Sunil Patil
DOI: 10.17485/ijst/2015/v8i34/85418 | Total views: 665
Exterior Features of Siberian Sturgeon Underyearlings when Applying Bs 225 Microbiological Preparation  | 
Grigoriy Nozdrin, Irina Moruzi, Yelena Pishchenko, Angela Ivanova, Sophia Nurutdinova, Yekaterina Startseva
DOI: 10.17485/ijst/2015/v8i34/85937 | Total views: 277
An Analysis on Occupational Attainment Process for People with Psychiatric Disabilities  | 
Hyun-Uk Shin
DOI: 10.17485/ijst/2015/v8i34/87460 | Total views: 198
A Zoom Lens Set for Mega Pixcel CCTV with an Aspheric Lens  | 
Doo Hee Han
DOI: 10.17485/ijst/2015/v8i34/87461 | Total views: 217
Multimodal Biometrics Recognition by using Modified Unconstrained Cohort Normalisation under Unconstrained Setting  | 
G. Angeline Prasanna, K. Anandakumar
DOI: 10.17485/ijst/2015/v8i34/70767 | Total views: 303
Ubiquitous Learning System using Femto Technology  | 
Young C. Park
DOI: 10.17485/ijst/2015/v8i34/87459 | Total views: 254
Interconnection Study of Joint Tactical Communications Systems  | 
Young C. Park
DOI: 10.17485/ijst/2015/v8i34/86125 | Total views: 248
Queue Length and Busy Period Analysis for the M/G/1 Queue with Negative Arrivals  | 
Doo Ho Lee, Hyun Min Park, Dae-Eun Lim
DOI: 10.17485/ijst/2015/v8i34/86273 | Total views: 437
Filter Dependence on the Phase Error of Fourier Transform Profilometry  | 
Yeon-Serk Yu, Meyong-Ho Lee, Woo-Young Song
DOI: 10.17485/ijst/2015/v8i34/86662 | Total views: 201
A Message Efficient Group Membership Protocol in Mobile Ad Hoc Distributed Systems  | 
Sung Hoon Park
DOI: 10.17485/ijst/2015/v8i34/85284 | Total views: 462
Design of Fast Finite Field Multiplier based on Noramal Basis  | 
Jae Yeon Choi
DOI: 10.17485/ijst/2015/v8i34/86663 | Total views: 192
Speech Recognition using Hidden Markov Models in Embedded Platform  | 
Dong-Ill Kim, Byung-Cheol Kim
DOI: 10.17485/ijst/2015/v8i34/85039 | Total views: 421
Investigating the Effect of Carbide Disperse Particles on Hardness and Wear Resistance of Experimental Materials in Cast and Deformed Conditions  | 
Ilya V. Chumanov, Valeriy I. Chumanov, Andrey N. Anikeev
DOI: 10.17485/ijst/2015/v8i34/85334 | Total views: 278
Investigation of Macro- and Microstructure of Experimental Composite Materials Obtained by Disperse Hardening Method  | 
Ilya V. Chumanov, Andrey N. Anikeev
DOI: 10.17485/ijst/2015/v8i34/85336 | Total views: 260
The Development of Technical Solutions for the Transverse Arrangement of Wheelsets of the Triaxial Non-Pedestal Bogies for Locomotives  | 
Ye. V. Slivinskiy, S. Yu Radin, I. N. Gridchina
DOI: 10.17485/ijst/2015/v8i34/85275 | Total views: 358
Study of the Processes of Metal Recovery from Steel Slags  | 
Andrey Nikolaevich Dildin, Iliya Valerievich Chumanov
DOI: 10.17485/ijst/2015/v8i34/85338 | Total views: 315
The New Methods for Assessing Soil Fertility Changes in the Apple Orchards in the North-Eastern Part of the Central Black Earth Region  | 
Vyacheslav L. Zakharov
DOI: 10.17485/ijst/2015/v8i34/85276 | Total views: 341
Methods to Increase Spring Rape Yield and Rape Product Quality in the Conditions of Central Black Earth Region Woodland Grass  | 
Tatyana V. Zubkova, Valentina A. Gulidova
DOI: 10.17485/ijst/2015/v8i34/85272 | Total views: 316
A Method of Reducing the Tillage Energy Intensity of Rotary Hillers using Adaptive Working Members with a Convertible Cutting Angle  | 
Vladimir F. Kupryashkin, Nikolay I. Naumkin, Aleksei S. Knyazkov, Michail N. Chatkin, Nikolay P. Pyatkin
DOI: 10.17485/ijst/2015/v8i34/85339 | Total views: 455
Malware Detection and Elimination using Bayesian Technique and Nymble Algorithm  | 
W. R. Salem Jeyaseelan, S. Hariharan
DOI: 10.17485/ijst/2015/v8i34/85244 | Total views: 363
A Hybrid Method for Coronary Heart Disease Risk Prediction using Decision Tree and Multi Layer Perceptron  | 
S. Akila, S. Chandramathi
DOI: 10.17485/ijst/2015/v8i34/85947 | Total views: 492
Quick Detection of Brain Tumor using a Combination of E-M and Levelset Method  | 
S. U. Aswathy, G. Glan Deva Dhas, S. S. Kumar
DOI: 10.17485/ijst/2015/v8i34/85361 | Total views: 251
An ANN Approach in Ensuring CIA Triangle using an Energy based Secured Protocol E-AODV for Enhancing the Performance in MANETS  | 
A. Sumathi, B. Vinayaga Sundaram
DOI: 10.17485/ijst/2015/v8i34/85243 | Total views: 313
A Safe Election Protocol based on an Unreliable Failure Detector in Distributed Systems  | 
SungHoon Park
DOI: 10.17485/ijst/2015/v8i34/86665 | Total views: 204
Hybrid Fuzzy Jordan Network for Robust and Efficient Intrusion Detection System  | 
A. Dhivya, S. N. Sivanandan
DOI: 10.17485/ijst/2015/v8i34/76697 | Total views: 374


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.